Mobile Phone Security and Forensics

A Practical Approach

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book Mobile Phone Security and Forensics by Iosif I. Androulidakis, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Iosif I. Androulidakis ISBN: 9783319297422
Publisher: Springer International Publishing Publication: March 22, 2016
Imprint: Springer Language: English
Author: Iosif I. Androulidakis
ISBN: 9783319297422
Publisher: Springer International Publishing
Publication: March 22, 2016
Imprint: Springer
Language: English

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

More books from Springer International Publishing

Cover of the book Brazilian Evangelicalism in the Twenty-First Century by Iosif I. Androulidakis
Cover of the book Skin Diseases in the Immunosuppressed by Iosif I. Androulidakis
Cover of the book Introduction to Particle and Astroparticle Physics by Iosif I. Androulidakis
Cover of the book Distribution of Insurance-Based Investment Products by Iosif I. Androulidakis
Cover of the book Medicinal Plants of Northern Thailand for the Treatment of Cognitive Impairment in the Elderly by Iosif I. Androulidakis
Cover of the book Transport Phenomena and Drying of Solids and Particulate Materials by Iosif I. Androulidakis
Cover of the book Social Phenomena by Iosif I. Androulidakis
Cover of the book Political Social Work by Iosif I. Androulidakis
Cover of the book The Soils of Antarctica by Iosif I. Androulidakis
Cover of the book Model-Based Control of Networked Systems by Iosif I. Androulidakis
Cover of the book Thomas Jefferson and his Decimals 1775–1810: Neglected Years in the History of U.S. School Mathematics by Iosif I. Androulidakis
Cover of the book Plant Programmed Cell Death by Iosif I. Androulidakis
Cover of the book Inclusive Mathematics Education by Iosif I. Androulidakis
Cover of the book A Shamanic Pneumatology in a Mystical Age of Sacred Sustainability by Iosif I. Androulidakis
Cover of the book The Science of Interest by Iosif I. Androulidakis
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy